Critical Infrastructure Protection Essay

1373 words - 6 pages

Critical Infrastructure Protection
Bobby Perkins
Emmanuel Nyeanchi
Strayer University
CIS 502 Theories Of Security Management
February 16, 2014

Critical Infrastructure Protection Explained
The expression "critical infrastructure" alludes to possessions of physical and PC based frameworks that are fundamental to the base operations of an economy and its government. They incorporate, however are not constrained to, telecommunications, vigor, saving money and account, transportation, water frameworks and crisis administrations, both government and private. Despite the fact that numerous country's critical infrastructures have verifiable been physically and coherently divided as ...view middle of the document...

Basically put, CIP is about ensuring holdings acknowledged priceless to social order that push social prosperity.

How to protect our assets
The six life cycle phases Infrastructure Analysis and Assessment, Remediation, Indications and Warning, Mitigation, Response, and Reconstitution span exercises that happen some time recently, throughout, and after occasions which may bring about infrastructure trade off or interruption. Infrastructure Analysis and Assessment, Remediation, and Indications and Warning primarily happen before occasions. Mitigation happens both before and during occasions. Response happens during occasions, and Reconstitution may begin during occasions however is by and large focused thereafter. Supporting and coordinating entities have responsibilities all around the life cycle that will be described later in this section. The activities of national CIP entities in this section speak to current understanding and planning assumptions, and are included to provide a setting for Dod activities. This characterization of the activities of national CIP entities is intended to be neither comprehensive nor directive in nature. Within each one cell of this life cycle matrix, the responsible entity will have the capacity to select around protection activities ranging from immediate and low-to-no expense, e.g., increased cognizance, to modified holding or infrastructure improvements. An increasing number of protection activities will be aimed at the risks inherent in imparted environments, and consequently require collaboration around entities to be effective. Some protection activities will have prerequisites, that is, activities must build upon each one in turn. Protection activities that have a cumulative impact may be bunched within a single unit, down a given section, over a given line, or crosswise over multiple columns and sections.
The most recent such charge, the Protecting Cyberspace as a National Asset Act, was presented last June by Sen. Joseph Lieberman (I-Conn.) and reconsidered in December by the Senate Committee on Homeland Security and Governmental Affairs. It calls for the development of a National Center for Cybersecurity and Communications (NCCC) inside the U.s. Division of Homeland Security (DHS) that might be answerable for securing both elected workstation systems and discriminating framework possessed by the private part against digital ambushes.

Spearphishing is the strategy by which programmers addition access to workstation arranges through sending deluding, pernicious messages which clients click on — is a danger to more than simply little PC systems. Consistent with the New York Times' "Bits" blog, basic foundation like "watersheds, force frameworks, oil refineries and atomic plants" are powerless against spearphishing strike. Spearphishing is so natural to convey and compelling that 91 percent of focused on strike begin with noxious messages, as per Trendmicro, a machine security...

Other Papers Like Critical Infrastructure Protection

Cloud Computing Essay

1456 words - 6 pages . Increased Storage With the massive Infrastructure that is offered by Cloud providers today, storage & maintenance of large volumes of data is a reality. Sudden workload spikes are also managed effectively & efficiently, since the cloud can scale dynamically. 3. Flexibility This is an extremely important characteristic. With enterprises having to adapt, even more rapidly, to changing business conditions, speed to deliver is critical. Cloud computing

Leadership Development Through Csr Essay

2182 words - 9 pages Companies who are known for setting up and operating infrastructure for environmental protection. Their waste management sites are built near villages in the outskirt of Surat, Gujarat. In a joint venture with IL&FS CDI, GETPL came up with a Garment training facility near Palsana village. The aim was to increase employment opportunity for the Below Poverty Line (BPL) beneficiaries of villages in and around Surat. This case will cover this

Presidential Powers

998 words - 4 pages in the current computer world (Thomas 2013). Thus, the American people are protected from cyber fraudsters who siphon their huge possessions. The proposal also protects critical national Information Technology infrastructure. This is by giving US government statutory authority to aid organizations that suffer cyber intrusion damages. It mandates DHS to offer oversight role on cyber practices on behalf of the government (Thomas 2013

Effective Enterprise Key Management

815 words - 4 pages management is the key to building comprehensive data protection infrastructure out of the chaotic world of single purpose encryption applications”. Effective key management involves managing the life cycle of the key as well as keeping the key separate from the data and the applications to maximize security. The task of reducing the risk of unauthorized access and adherence to the data protection policies is challenging and most of the management

I Don't Like Mondays

3515 words - 15 pages Introduction Critical infrastructures are the large-scale, reliable and essential products and services which support our society. In Canada, under the National Security Policy (NSP) there are 10 National Critical Infrastructure (NCI) sectors. Federal, provincial and territorial governments are collaborating to provide policies, directive, knowledge, and funds to protect these 10 NCIs, as a disruption to them will have a severe impact on

Cyber Threats

658 words - 3 pages targets by sub-national groups or clandestine agents Unlike an annoying virus or computer attack that results in denial of service, a cyber terrorist attack could lead to physical violence or extreme financial harm. According to the U.S. Commission of Critical Infrastructure Protection, possible cyber terrorism targets include the banking industry, military installations, power plants, air traffic control centers, and water systems. Cyber

Foreign Direct Investment

4094 words - 17 pages signed as expected and statistically significant. In other words,a one percentage improvement in infrastructure would induce FDI flow to rise by approximately 2.6% annually. No doubt that infrastructure is critical in inducing FDI flows into a host country. 2.3 EXCHANGE RATE According to Zubair (2004), who support the view that exchange rate is always associated with foreign direct investment, he said that rate of exchange has long

Legal, Safety, And Regulatory Regulations In Hr

779 words - 4 pages difference in protecting the privacy of employees and their employers, is the U.S Department of Homeland Security (DHS). While technology has allowed all types of business entities to learn and prosper, technology has also been a source of breached information. Threats and vulnerabilities aimed at privacy violation increase with our advanced society's reliance on cyber-dependent systems. The protection of our critical infrastructure is now one of our

Monitor Critical It Environments With A Rack Mounted Network Camera

705 words - 3 pages data, should an incident occur. Using high-quality network video to record individual access will ensure proactive protection of your network infrastructure, giving you the ability to see who accessed your servers and switches. Record and archive video to look back after an event has occurred or in real-time. > Protect valuable assets and customer information > Easy and flexible installation > Data privacy compliance IT Environment

Chapter 1 Review Questions

870 words - 4 pages protection (assuring the security of utility services) related to information security? A. Both infrastructure protection and information security share the same overall goal, which is to ensure that data is available when, where and how it is needed. 4. What type of security was dominant in the early years of computing? A. Early security was entirely physical security. 5. What are the three components of the C.I.A. Triangle? What are they used

Chapter 1-Introduction to Information Security: Principles of Information Security

979 words - 4 pages damage. Exposure: is a single instance when a system is open to damage. Vulnerabilities can in turn be the cause of exposure. 3. How is infrastructure protection (assuring the security of utility services) related to information security? The organization needs to have clear parameters and set regulation when it comes to the protection of itself. Clear goals and objectives when it comes to protection will lead to a better protection on

Related Essays

Assignment 2 Critical Infrastructure Protection

1707 words - 7 pages         Assignment 2: Critical Infrastructure Protection Strayer University Introduction In the wake of a terrorist attack, natural disaster, or emergency, the Department of Homeland Security (DHS) is prepared to respond.   DHS primary responsibilities are combatting terrorism, securing boarders, enforcing immigration laws, safeguarding cyberspace, and responding to natural disasters. Coordination with the federal response teams and

The Nature Conservancy Essay

898 words - 4 pages and storm surge, and they remove pollution from the millions of gallons of freshwater that flow into our oceans each minute.The Conservancy’s coastal restoration and protectionstrategy aims to preserve and enhance these natural-systems and ensure they continue to deliver critical protection for our coastal cities. The Conservancy’s urban strategy advances natural infrastructure as a critical asset for coastal defense. This report demon-strates that natural infrastructure can and should be considered side by side with built infrastructure in evaluating sustainable solutions for protecting our coastal cities from the impacts of climate change

Private Security Essay

1970 words - 8 pages disperse their public resources accordingly while being able to trust the private sector to fill in the various gaps. Lastly, in another article anonymously penned, the author discusses at great length the development of the National Infrastructure Protection Plan (NIPP) which originally called upon all 17 critical infrastructure sectors to initiate voluntary private sector councils. Shortly after the creation of the Department of Homeland

Unit 5 Individual Project Essay

1226 words - 5 pages private enterprise in the protection of critical infrastructure and key resources. This paper will also give examples of programs that address governments on all levels, private enterprises, or individuals in the DHS mission areas of Prevention, Response, and Recovery. The Private Sector Office has four major missions: * Engage individual businesses, trade associations and other non-governmental organizations to foster dialogue with the